Sie sind auf Seite 1von 11

Electronic Document Preparation&

Management SBA

1
\

INTRODUCTION
 This ELECTRONIC DOCUMENT PREPARATION &MANAGEMENT, SCHOOL BASED ASSIGNMENT is
done as a part of the CSES examination and is based on the topic cyber security.

2
Acknowledgement
This school based assignment would not have been complete or concluded without the obligation
and the mutual support of my cousin Anastasia Persaud.

The researcher wishes to thank all family members for understanding and cooperation with her
also for released her household chores and assistance psychologically and financially,

The researcher would like to pass out a special thanks to her subject teacher who guided her in
every step until at the conclusion of this school based assignment.

3
Aim
 To protect the computer, network and software programs from such cyber-attacks most
of these digital attacks are aimed at accessing, altering or deleting sensitive information
extorting money from victims or interrupting normal business operations.

4
Objective
 The purpose of cyber security is to help prevent cyber-attacks, data breaches and identify
theft and can aid in risk management.

5

WHAT IS CYBER SECURITY

 CYBER SECURITY REFERS TO THE BODY OF TECHNOLOGIES, PROCESSES AND PRACTICES


DESIGNED TO PROTECT NETWORK, DEVICES, PROGRAMS AND DATA FROM ATTACK,
DAMAGE OR UNAUTHORIZED ACCESS.

TYPES OF CYBER SECURITY


6
 Critical Infrastructure Security- consists of the cyber-physical systems that modern
society CRI

T Application Security- is much more accessible over networks, causing the adoption of
security measures during the development phrase to be an imperative phrase of the
project.

 
 Network Security- ensures that internal networks are secure by protecting the
infrastructure and inhibiting access to it.

 Cloud Security- is a software base security tool that protects and monitors the data in
your cloud resources. 

 Internet of Thing Security- refers to or wide variety of critical and non-critical cyber
physical systems.

L SECURITY-
INFRASTRUCTURE

CONSISTS OF THE CYBER-

7
ADVANTAGES & DISADVANTAGES OF CYBER SECURITY

ADVATAGES
 It provides protection against worms, viruses, spyware and other unwanted
programs.
 It provides protection from data theft as with the implementation high-security
protocol malicious user cannot break the network architecture.
 Protect the system from hacking.
 Provide data and system privacy. This can be achieved with the good
implementation of security policies and protocols in the network.
 
 
DISADVANTAGES
 
 Rulers of the firewall are difficult to configure correctly.
 Makes the system week sometimes too much security can backfire.

It is costly for the average.


 Incorrect firewalls rulers block the user from accessing various services of the
network

PHYSICAL SYSTEMS THAT


MODERN SOCIETIRITY

EFFECTS OF CYBER SECURITY


8
 Foreign nationalists

 Criminals

 Hackers

 Disgruntled employees

 Cyber incidents happens everyday

 Negative impact to both economic and national security

Loss of classified information and intellectual properly worth millions

9
PLACES THAT ARE AFFECTED BY CYBER SECURITY

 The United State

 China

 Brazil

 India

 Germany

 Russia

 The United Kingdom

 Vietnam

 Japan

 France

10
Chart showing cyber security

11

Das könnte Ihnen auch gefallen